1942:
1952:
1962:
290:
a failure is said to occur. A failure is basically the point at which it can be said that a service is failing to meet its specification. Since the output data from one service may be fed into another, a failure in one service may propagate into another service as a fault so a chain can be formed of the form: Fault leading to Error leading to
Failure leading to Error, etc.
184:
289:
Once a fault is activated an error is created. An error may act in the same way as a fault in that it can create further error conditions, therefore an error may propagate multiple times within a system boundary without causing an observable failure. If an error propagates outside the system boundary
276:
Error: An error is a discrepancy between the intended behavior of a system and its actual behavior inside the system boundary. Errors occur at runtime when some part of the system enters an unexpected state due to the activation of a fault. Since errors are generated from invalid states they are hard
81:
develops and maintains international standards that provide systematic methods and tools for dependability assessment and management of equipment, services, and systems throughout their life cycles. The IFIP Working Group 10.4 on "Dependable
Computing and Fault Tolerance" plays a role in synthesizing
285:
It is important to note that
Failures are recorded at the system boundary. They are basically Errors that have propagated to the system boundary and have become observable. Faults, Errors and Failures operate according to a mechanism. This mechanism is sometimes known as a Fault-Error-Failure chain.
272:
Fault: A fault (which is usually referred to as a bug for historic reasons) is a defect in a system. The presence of a fault in a system may or may not lead to a failure. For instance, although a system may contain a fault, its input and state conditions may never cause this fault to be executed so
234:
As these definitions suggested, only
Availability and Reliability are quantifiable by direct measurements whilst others are more subjective. For instance Safety cannot be measured directly via metrics but is a subjective assessment that requires judgmental information to be applied to give a level
280:
Failure: A failure is an instance in time when a system displays behavior that is contrary to its specification. An error may not necessarily cause a failure, for instance an exception may be thrown by a system but this may be caught and handled using fault tolerance techniques so the overall
286:
As a general rule a fault, when activated, can lead to an error (which is an invalid state) and the invalid state generated by an error may lead to another error or a failure (which is an observable deviation from the specified behavior at the system boundary).
321:
Removal during development requires verification so that faults can be detected and removed before a system is put into production. Once systems have been put into production a system is needed to record failures and remove them via a maintenance cycle.
380:
The flexibility of current frameworks encourage system architects to enable reconfiguration mechanisms that refocus the available, safe resources to support the most critical services rather than over-provisioning to build failure-proof system.
298:
Since the mechanism of a Fault-Error-Chain is understood it is possible to construct means to break these chains and thereby increase the dependability of a system. Four means have been identified so far:
529:
is an open access journal that provides an international forum for the electronic publication of original research and industrial experience articles in all areas of systems dependability and prognostics.
874:
Moradi, Mehrdad, Bentley James Oakes, Mustafa
Saraoglu, Andrey Morozov, Klaus Janschek, and Joachim Denil. "Exploring Fault Parameter Space Using Reinforcement Learning-based Fault Injection." (2020).
257:. Security is sometimes classed as an attribute but the current view is to aggregate it together with dependability and treat Dependability as a composite term called Dependability and Security.
406:
136:
135:
The field of dependability has evolved from these beginnings to be an internationally active field of research fostered by a number of prominent international conferences, notably the
331:
deals with putting mechanisms in place that will allow a system to still deliver the required service in the presence of faults, although that service may be at a degraded level.
520:
316:
Fault
Prevention deals with preventing faults being introduced into a system. This can be accomplished by use of development methodologies and good implementation techniques.
70:
is the ability to provide services that can be trusted within a time-period. The service guarantees must hold even when the system is subject to attacks or natural failures.
767:
738:, "Software Dependability: A Personal View", in the Proc of the 25th International Symposium on Fault-Tolerant Computing (FTCS-25), California, USA, pp 35-41, June 1995.
260:
Practically, applying security measures to the appliances of a system generally improves the dependability by limiting the number of externally originated errors.
803:
985:
113:
Some sources hold that word was coined in the nineteen-teens in Dodge
Brothers automobile print advertising. But the word predates that period, with the
78:
74:
747:
J.C. Laprie. "Dependable
Computing and Fault Tolerance: Concepts and terminology," in Proc. 15th IEEE Int. Symp. on Fault-Tolerant Computing, 1985
699:
1695:
1667:
120:
As interest in fault tolerance and system reliability increased in the 1960s and 1970s, dependability came to be a measure of as measures of
1720:
827:
268:
Threats are things that can affect a system and cause a drop in
Dependability. There are three main terms that must be clearly understood:
1571:
852:"Optimizing fault injection in FMI co-simulation through sensitivity partitioning | Proceedings of the 2019 Summer Simulation Conference"
1725:
1004:
1237:
1877:
1705:
1242:
553:
430:
802:
Moradi, Mehrdad; Van Acker, Bert; Vanherpen, Ken; Denil, Joachim (2019). Chamberlain, Roger; Taha, Walid; Törngren, Martin (eds.).
630:
1965:
1066:
496:
International
Symposium on Dependable Systems and Networks (DSN): Flagship conference of the community, annually held since 1970.
1353:
888:
1606:
377:, thus taking into account the degraded services that an Information System sustains or resumes after a non-maskable failure.
1986:
1644:
1270:
978:
634:
397:
is defined as "quantifying how well the object system performs in the presence of faults over a specified period of time".
1786:
1763:
1493:
1483:
368:
187:
Taxonomy showing relationship between Dependability & Security and Attributes, Threats and Means (after Laprie et al.)
523:
is the flagship journal that comes under the purview of the IEEE Technical Committee on Fault Tolerant Computing (TCFTC).
1867:
1455:
1363:
1275:
1051:
1036:
128:
as the term to encompass studies of fault tolerance and system reliability without the extension of meaning inherent in
1996:
1955:
1690:
1195:
124:
came to encompass additional measures like safety and integrity. In the early 1980s, Jean-Claude Laprie thus chose
1927:
1576:
82:
the technical community's progress in the field and organizes two workshops each year to disseminate the results.
1945:
1872:
1847:
1710:
1358:
971:
580:
114:
1796:
1629:
1222:
1091:
334:
Dependability means are intended to reduce the number of failures made visible to the end users of a system.
2006:
1857:
1791:
1682:
1498:
1165:
483:
445:
349:
Intermittent: They appear multiple times, possibly without a discernible pattern, and disappear on their own
319:
Fault Removal can be sub-divided into two sub-categories: Removal During Development and Removal During Use.
209:
155:
121:
325:
Fault Forecasting predicts likely faults so that they can be removed or their effects can be circumvented.
1922:
1753:
1634:
1401:
1391:
1386:
602:
191:
Attributes are qualities of a system. These can be assessed to determine its overall dependability using
1892:
1862:
1852:
1748:
1662:
1538:
1478:
1445:
1435:
1325:
1290:
1280:
1217:
1086:
1061:
1056:
1021:
454: – Engineering discipline which assures that engineered systems provide acceptable levels of safety
196:
1652:
1624:
1596:
1591:
1420:
1396:
1348:
1333:
1315:
1305:
1300:
1262:
1212:
1207:
1124:
1070:
647:
1917:
1842:
1758:
1743:
1508:
1295:
1252:
1247:
1144:
1134:
1106:
471:
63:
31:
1882:
1781:
1657:
1614:
1523:
1465:
1450:
1440:
1232:
1031:
833:
510:
Pacific Rim International Symposium on Dependable Computing (PRDC): Its 25th offering is in 2021.
451:
363:
2001:
1902:
1832:
1811:
1773:
1581:
1548:
1528:
1227:
1139:
1013:
823:
549:
499:
International Symposium on Reliable Distributed Systems (SRDS): Its 40th offering is in 2021.
2011:
1735:
1619:
1586:
1381:
1310:
1199:
1185:
1180:
1129:
1116:
1041:
994:
815:
620:
Rigorous Open Development Environment for Complex Systems FP6/IST targeted project 2004–2007
192:
1991:
1806:
1700:
1672:
1566:
1518:
1503:
1488:
1343:
1338:
1285:
1175:
1149:
1101:
1046:
892:
651:
479:
418:
412:
328:
246:
238:
227:
159:
762:
346:
Transient: They appear without apparent cause and disappear again without apparent cause
1912:
1816:
1715:
1561:
1533:
424:
792:, "Fundamental Concepts of Dependability," presented at ISW-2000, Cambridge, MA, 2000.
507:
Latin-American Symposium on Dependable Computing (LADC): Its 10th offering is in 2021.
1980:
1801:
851:
837:
789:
757:
735:
695:
386:
373:
885:
17:
1897:
1556:
906:
254:
203:
151:
702:," IEEE Transactions on Dependable and Secure Computing, vol. 1, pp. 11-33, 2004.
478:
Stefano Porcarelli, Marco Castaldi, Felicita Di Giandomenico, Andrea Bondavalli,
277:
to observe without special mechanisms, such as debuggers or debug output to logs.
273:
that an error occurs; and thus that particular fault never exhibits as a failure.
1887:
1513:
1425:
819:
1907:
1837:
1430:
1170:
1026:
98:- an understanding of the things that can affect the dependability of a system
804:"Model-Implemented Hybrid Fault Injection for Simulink (Tool Demonstrations)"
1412:
1373:
250:
221:
484:
An Approach to Manage Reconfiguration in Fault-Tolerant Distributed Systems
448: – Sub-discipline of systems engineering that emphasizes dependability
199:
measures. Avizienis et al. define the following Dependability Attributes:
1473:
235:
of confidence, whilst Reliability can be measured as failures over time.
218:- absence of catastrophic consequences on the user(s) and the environment
167:
532:
215:
163:
526:
963:
415: – Testing how computer systems behave under unusual stresses
393:
To take into account the level of performance, the measurement of
352:
Permanent: Once they appear, they do not get resolved on their own
245:
is also used when addressing security. Security is a composite of
182:
144:
886:
Towards a Rigorous Definition of Information System Survivability
712:
436:
390:
was introduced to give greater importance to users' experience.
183:
140:
967:
943:
597:
European security Forum for Web Services, Software, and Systems
586:
342:
Based on how faults appear or persist, they are classified as:
700:
Basic Concepts and Taxonomy of Dependable and Secure Computing
679:
919:
421: – Resilience of systems to component failures or errors
617:
611:
779:
I. Sommerville, Software Engineering: Addison-Wesley, 2004.
690:
688:
521:
IEEE Transactions on Dependable and Secure Computing (TDSC)
439: – Engineering characterization of a product or system
407:
International Conference on Dependable Systems and Networks
145:
International Symposium on Software Reliability Engineering
137:
International Conference on Dependable Systems and Networks
639:
System for Terrorism Intervention and Large-scale Teamwork
384:
With the generalisation of networked information systems,
281:
operation of the system will conform to the specification.
644:
433: – Non-functional requirements for system evaluation
883:
John C. Knight, Elisabeth A. Strunk, Kevin J. Sullivan:
682:, select 192 Dependability, see 192-01-22 Dependability.
577:
DEpendability and Security by Enhanced REConfigurability
572:
533:
International Journal of Critical Computer-Based Systems
907:
Specification and construction of performability models
441:
Pages displaying short descriptions of redirect targets
150:
Traditionally, dependability for a system incorporates
141:
International Symposium on Reliable Distributed Systems
560:
Reliable Computer Systems : Design and Evaluation
357:
Dependability of information systems and survivability
85:
Dependability can be broken down into three elements:
243:
the absence of unauthorized disclosure of information
1825:
1772:
1734:
1681:
1643:
1605:
1547:
1464:
1410:
1372:
1324:
1261:
1194:
1158:
1115:
1079:
1012:
50:, and in some cases, other characteristics such as
814:. Cham: Springer International Publishing: 71–90.
625:System Engineering for Security and Dependability
562:, A K Peters/CRC Press, 1998. ISBN 978-1568810928
606:HIghly DEpendable ip-based NETworks and Services
92:- a way to assess the dependability of a system
170:have been added to measures of dependability.
1003:Note: This template roughly follows the 2012
979:
788:A. Avizienis, V. Magnus U, J. C. Laprie, and
546:Dependability: Basic Concepts and Terminology
8:
361:Some works on dependability use structured
427: – Mathematical program specifications
104:- ways to increase a system's dependability
986:
972:
964:
808:Cyber Physical Systems. Model-Based Design
655:Dependable and Secure Service Composition
75:International Electrotechnical Commission
230:- ability for easy maintenance (repair)
224:- absence of improper system alteration
667:
614:FP6/IST Network of Excellence 2006–2007
1696:Knowledge representation and reasoning
657:, FP7/IST integrated project 2010–2014
627:, FP6/IST integrated project 2006–2008
558:Daniel P. Siewiorek, Robert S. Swarz,
409: – Computer networking conference
1721:Philosophy of artificial intelligence
810:. Lecture Notes in Computer Science.
763:Fundamental Concepts of Dependability
503:More regionally focused conferences:
7:
1047:Energy consumption (Green computing)
608:, FP6/IST targeted project 2006–2008
472:Software Fault Tolerance: A Tutorial
1726:Distributed artificial intelligence
1005:ACM Computing Classification System
77:(IEC), via its Technical Committee
1238:Integrated development environment
904:John F. Meyer, William H. Sanders
676:Electropedia del 192 Dependability
25:
1706:Automated planning and scheduling
1243:Software configuration management
713:"Dependable Systems and Networks"
631:Willow Survivability Architecture
583:/IST integrated project 2006–2008
431:List of system quality attributes
1960:
1950:
1941:
1940:
1951:
1354:Computational complexity theory
756:A. Avizienis, J.-C. Laprie and
212:- continuity of correct service
206:- readiness for correct service
117:finding its first use in 1901.
1145:Network performance evaluation
27:Measure in systems engineering
1:
1509:Multimedia information system
1494:Geographic information system
1484:Enterprise information system
1080:Computer systems organization
599:, FP6/IST coordination action
591:Network on DEpendable Systems
371:, to introduce the attribute
1868:Computational social science
1456:Theoretical computer science
1276:Software development process
1052:Electronic design automation
1037:Very Large Scale Integration
694:A. Avizienis, J.-C. Laprie,
1691:Natural language processing
1479:Information storage systems
820:10.1007/978-3-030-23703-5_4
766:. Research Report No 1145,
680:http://www.electropedia.org
38:is a measure of a system's
2028:
1607:Human–computer interaction
1577:Intrusion detection system
1489:Social information systems
1474:Database management system
1936:
1873:Computational engineering
1848:Computational mathematics
1001:
548:, Springer-Verlag, 1992.
469:Wilfredo Torres-Pomales:
174:Elements of dependability
115:Oxford English Dictionary
1883:Computational healthcare
1878:Differentiable computing
1797:Graphics processing unit
1223:Domain-specific language
1092:Computational complexity
1858:Computational chemistry
1792:Photograph manipulation
1683:Artificial intelligence
1499:Decision support system
446:Reliability engineering
1923:Educational technology
1754:Reinforcement learning
1504:Process control system
1402:Computational geometry
1392:Algorithmic efficiency
1387:Analysis of algorithms
1042:Systems on Chip (SoCs)
188:
1987:Computing terminology
1893:Electronic publishing
1863:Computational biology
1853:Computational physics
1749:Unsupervised learning
1663:Distributed computing
1539:Information retrieval
1446:Mathematical analysis
1436:Mathematical software
1326:Theory of computation
1291:Software construction
1281:Requirements analysis
1159:Software organization
1087:Computer architecture
1057:Hardware acceleration
1022:Printed circuit board
717:www.dependability.org
186:
162:but since the 1980s,
1653:Concurrent computing
1625:Ubiquitous computing
1597:Application security
1592:Information security
1421:Discrete mathematics
1397:Randomized algorithm
1349:Computability theory
1334:Model of computation
1306:Software maintenance
1301:Software engineering
1263:Software development
1213:Programming language
1208:Programming paradigm
1125:Network architecture
768:Lydford g DrAAS-CNRS
698:, and C. Landwehr, "
18:Dispatch reliability
1928:Document management
1918:Operations research
1843:Enterprise software
1759:Multi-task learning
1744:Supervised learning
1466:Information systems
1296:Software deployment
1253:Software repository
1107:Real-time computing
948:srds-conference.org
527:Prognostics Journal
364:information systems
64:real-time computing
32:systems engineering
1997:Safety engineering
1711:Search methodology
1658:Parallel computing
1615:Interaction design
1524:Computing platform
1451:Numerical analysis
1441:Information theory
1233:Software framework
1196:Software notations
1135:Network components
1032:Integrated circuit
891:2006-10-29 at the
650:2019-12-02 at the
452:Safety engineering
189:
1974:
1973:
1903:Electronic voting
1833:Quantum Computing
1826:Applied computing
1812:Image compression
1582:Hardware security
1572:Security services
1529:Digital marketing
1316:Open-source model
1228:Modeling language
1140:Network scheduler
924:dsn2022.github.io
829:978-3-030-23703-5
567:Research projects
16:(Redirected from
2019:
1964:
1963:
1954:
1953:
1944:
1943:
1764:Cross-validation
1736:Machine learning
1620:Social computing
1587:Network security
1382:Algorithm design
1311:Programming team
1271:Control variable
1248:Software library
1186:Software quality
1181:Operating system
1130:Network protocol
995:Computer science
988:
981:
974:
965:
958:
957:
955:
954:
940:
934:
933:
931:
930:
916:
910:
902:
896:
881:
875:
872:
866:
865:
863:
862:
848:
842:
841:
799:
793:
786:
780:
777:
771:
754:
748:
745:
739:
733:
727:
726:
724:
723:
709:
703:
692:
683:
672:
442:
21:
2027:
2026:
2022:
2021:
2020:
2018:
2017:
2016:
1977:
1976:
1975:
1970:
1961:
1932:
1913:Word processing
1821:
1807:Virtual reality
1768:
1730:
1701:Computer vision
1677:
1673:Multiprocessing
1639:
1601:
1567:Security hacker
1543:
1519:Digital library
1460:
1411:Mathematics of
1406:
1368:
1344:Automata theory
1339:Formal language
1320:
1286:Software design
1257:
1190:
1176:Virtual machine
1154:
1150:Network service
1111:
1102:Embedded system
1075:
1008:
997:
992:
962:
961:
952:
950:
942:
941:
937:
928:
926:
918:
917:
913:
903:
899:
893:Wayback Machine
882:
878:
873:
869:
860:
858:
850:
849:
845:
830:
801:
800:
796:
787:
783:
778:
774:
755:
751:
746:
742:
734:
730:
721:
719:
711:
710:
706:
693:
686:
673:
669:
664:
652:Wayback Machine
569:
541:
517:
493:
480:Paola Inverardi
466:
461:
459:Further reading
440:
419:Fault tolerance
413:Fault injection
403:
359:
340:
329:Fault Tolerance
320:
296:
266:
247:Confidentiality
239:Confidentiality
228:Maintainability
181:
176:
160:maintainability
111:
48:maintainability
28:
23:
22:
15:
12:
11:
5:
2025:
2023:
2015:
2014:
2009:
2007:Formal methods
2004:
1999:
1994:
1989:
1979:
1978:
1972:
1971:
1969:
1968:
1958:
1948:
1937:
1934:
1933:
1931:
1930:
1925:
1920:
1915:
1910:
1905:
1900:
1895:
1890:
1885:
1880:
1875:
1870:
1865:
1860:
1855:
1850:
1845:
1840:
1835:
1829:
1827:
1823:
1822:
1820:
1819:
1817:Solid modeling
1814:
1809:
1804:
1799:
1794:
1789:
1784:
1778:
1776:
1770:
1769:
1767:
1766:
1761:
1756:
1751:
1746:
1740:
1738:
1732:
1731:
1729:
1728:
1723:
1718:
1716:Control method
1713:
1708:
1703:
1698:
1693:
1687:
1685:
1679:
1678:
1676:
1675:
1670:
1668:Multithreading
1665:
1660:
1655:
1649:
1647:
1641:
1640:
1638:
1637:
1632:
1627:
1622:
1617:
1611:
1609:
1603:
1602:
1600:
1599:
1594:
1589:
1584:
1579:
1574:
1569:
1564:
1562:Formal methods
1559:
1553:
1551:
1545:
1544:
1542:
1541:
1536:
1534:World Wide Web
1531:
1526:
1521:
1516:
1511:
1506:
1501:
1496:
1491:
1486:
1481:
1476:
1470:
1468:
1462:
1461:
1459:
1458:
1453:
1448:
1443:
1438:
1433:
1428:
1423:
1417:
1415:
1408:
1407:
1405:
1404:
1399:
1394:
1389:
1384:
1378:
1376:
1370:
1369:
1367:
1366:
1361:
1356:
1351:
1346:
1341:
1336:
1330:
1328:
1322:
1321:
1319:
1318:
1313:
1308:
1303:
1298:
1293:
1288:
1283:
1278:
1273:
1267:
1265:
1259:
1258:
1256:
1255:
1250:
1245:
1240:
1235:
1230:
1225:
1220:
1215:
1210:
1204:
1202:
1192:
1191:
1189:
1188:
1183:
1178:
1173:
1168:
1162:
1160:
1156:
1155:
1153:
1152:
1147:
1142:
1137:
1132:
1127:
1121:
1119:
1113:
1112:
1110:
1109:
1104:
1099:
1094:
1089:
1083:
1081:
1077:
1076:
1074:
1073:
1064:
1059:
1054:
1049:
1044:
1039:
1034:
1029:
1024:
1018:
1016:
1010:
1009:
1002:
999:
998:
993:
991:
990:
983:
976:
968:
960:
959:
935:
911:
897:
876:
867:
843:
828:
794:
781:
772:
749:
740:
728:
704:
684:
666:
665:
663:
660:
659:
658:
642:
628:
621:
615:
609:
600:
593:
584:
568:
565:
564:
563:
556:
540:
537:
536:
535:
530:
524:
516:
513:
512:
511:
508:
501:
500:
497:
492:
489:
488:
487:
476:
465:
462:
460:
457:
456:
455:
449:
443:
434:
428:
425:Formal methods
422:
416:
410:
402:
399:
395:performability
358:
355:
354:
353:
350:
347:
339:
336:
314:
313:
310:
307:
304:
295:
292:
283:
282:
278:
274:
265:
262:
232:
231:
225:
219:
213:
207:
180:
177:
175:
172:
110:
107:
106:
105:
99:
93:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2024:
2013:
2010:
2008:
2005:
2003:
2000:
1998:
1995:
1993:
1990:
1988:
1985:
1984:
1982:
1967:
1959:
1957:
1949:
1947:
1939:
1938:
1935:
1929:
1926:
1924:
1921:
1919:
1916:
1914:
1911:
1909:
1906:
1904:
1901:
1899:
1896:
1894:
1891:
1889:
1886:
1884:
1881:
1879:
1876:
1874:
1871:
1869:
1866:
1864:
1861:
1859:
1856:
1854:
1851:
1849:
1846:
1844:
1841:
1839:
1836:
1834:
1831:
1830:
1828:
1824:
1818:
1815:
1813:
1810:
1808:
1805:
1803:
1802:Mixed reality
1800:
1798:
1795:
1793:
1790:
1788:
1785:
1783:
1780:
1779:
1777:
1775:
1771:
1765:
1762:
1760:
1757:
1755:
1752:
1750:
1747:
1745:
1742:
1741:
1739:
1737:
1733:
1727:
1724:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1688:
1686:
1684:
1680:
1674:
1671:
1669:
1666:
1664:
1661:
1659:
1656:
1654:
1651:
1650:
1648:
1646:
1642:
1636:
1635:Accessibility
1633:
1631:
1630:Visualization
1628:
1626:
1623:
1621:
1618:
1616:
1613:
1612:
1610:
1608:
1604:
1598:
1595:
1593:
1590:
1588:
1585:
1583:
1580:
1578:
1575:
1573:
1570:
1568:
1565:
1563:
1560:
1558:
1555:
1554:
1552:
1550:
1546:
1540:
1537:
1535:
1532:
1530:
1527:
1525:
1522:
1520:
1517:
1515:
1512:
1510:
1507:
1505:
1502:
1500:
1497:
1495:
1492:
1490:
1487:
1485:
1482:
1480:
1477:
1475:
1472:
1471:
1469:
1467:
1463:
1457:
1454:
1452:
1449:
1447:
1444:
1442:
1439:
1437:
1434:
1432:
1429:
1427:
1424:
1422:
1419:
1418:
1416:
1414:
1409:
1403:
1400:
1398:
1395:
1393:
1390:
1388:
1385:
1383:
1380:
1379:
1377:
1375:
1371:
1365:
1362:
1360:
1357:
1355:
1352:
1350:
1347:
1345:
1342:
1340:
1337:
1335:
1332:
1331:
1329:
1327:
1323:
1317:
1314:
1312:
1309:
1307:
1304:
1302:
1299:
1297:
1294:
1292:
1289:
1287:
1284:
1282:
1279:
1277:
1274:
1272:
1269:
1268:
1266:
1264:
1260:
1254:
1251:
1249:
1246:
1244:
1241:
1239:
1236:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1214:
1211:
1209:
1206:
1205:
1203:
1201:
1197:
1193:
1187:
1184:
1182:
1179:
1177:
1174:
1172:
1169:
1167:
1164:
1163:
1161:
1157:
1151:
1148:
1146:
1143:
1141:
1138:
1136:
1133:
1131:
1128:
1126:
1123:
1122:
1120:
1118:
1114:
1108:
1105:
1103:
1100:
1098:
1097:Dependability
1095:
1093:
1090:
1088:
1085:
1084:
1082:
1078:
1072:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1050:
1048:
1045:
1043:
1040:
1038:
1035:
1033:
1030:
1028:
1025:
1023:
1020:
1019:
1017:
1015:
1011:
1006:
1000:
996:
989:
984:
982:
977:
975:
970:
969:
966:
949:
945:
939:
936:
925:
921:
915:
912:
909:
908:
901:
898:
895:
894:
890:
887:
880:
877:
871:
868:
857:
853:
847:
844:
839:
835:
831:
825:
821:
817:
813:
809:
805:
798:
795:
791:
790:Brian Randell
785:
782:
776:
773:
769:
765:
764:
759:
758:Brian Randell
753:
750:
744:
741:
737:
736:Brian Randell
732:
729:
718:
714:
708:
705:
701:
697:
696:Brian Randell
691:
689:
685:
681:
677:
671:
668:
661:
656:
653:
649:
646:
643:
640:
636:
632:
629:
626:
622:
619:
616:
613:
610:
607:
604:
601:
598:
594:
592:
588:
585:
582:
578:
574:
571:
570:
566:
561:
557:
555:
554:0-387-82296-8
551:
547:
544:J.C. Laprie,
543:
542:
538:
534:
531:
528:
525:
522:
519:
518:
514:
509:
506:
505:
504:
498:
495:
494:
490:
486:
485:
481:
477:
474:
473:
468:
467:
463:
458:
453:
450:
447:
444:
438:
435:
432:
429:
426:
423:
420:
417:
414:
411:
408:
405:
404:
400:
398:
396:
391:
389:
388:
387:accessibility
382:
378:
376:
375:
374:survivability
370:
366:
365:
356:
351:
348:
345:
344:
343:
337:
335:
332:
330:
326:
323:
317:
311:
308:
305:
302:
301:
300:
293:
291:
287:
279:
275:
271:
270:
269:
263:
261:
258:
256:
252:
248:
244:
240:
236:
229:
226:
223:
220:
217:
214:
211:
208:
205:
202:
201:
200:
198:
194:
185:
178:
173:
171:
169:
165:
161:
157:
153:
148:
146:
142:
138:
133:
131:
127:
126:dependability
123:
118:
116:
108:
103:
100:
97:
94:
91:
88:
87:
86:
83:
80:
76:
71:
69:
68:dependability
65:
61:
57:
53:
49:
45:
41:
37:
36:dependability
33:
19:
1898:Cyberwarfare
1557:Cryptography
1096:
951:. Retrieved
947:
938:
927:. Retrieved
923:
914:
905:
900:
884:
879:
870:
859:. Retrieved
855:
846:
811:
807:
797:
784:
775:
770:, April 2001
761:
752:
743:
731:
720:. Retrieved
716:
707:
675:
670:
654:
638:
624:
605:
596:
590:
576:
559:
545:
502:
482:
470:
394:
392:
385:
383:
379:
372:
367:, e.g. with
362:
360:
341:
333:
327:
324:
318:
315:
297:
288:
284:
267:
259:
255:Availability
242:
237:
233:
204:Availability
197:Quantitative
190:
152:availability
149:
134:
129:
125:
119:
112:
101:
95:
89:
84:
72:
67:
59:
55:
51:
47:
43:
40:availability
39:
35:
29:
1908:Video games
1888:Digital art
1645:Concurrency
1514:Data mining
1426:Probability
1166:Interpreter
944:"SRDS-2021"
491:Conferences
338:Persistence
309:Forecasting
210:Reliability
193:Qualitative
156:reliability
130:reliability
122:reliability
44:reliability
1981:Categories
1966:Glossaries
1838:E-commerce
1431:Statistics
1374:Algorithms
1171:Middleware
1027:Peripheral
953:2021-08-01
929:2021-08-01
920:"DSN 2022"
861:2020-06-15
856:dl.acm.org
722:2021-06-08
662:References
303:Prevention
179:Attributes
90:Attributes
52:durability
1787:Rendering
1782:Animation
1413:computing
1364:Semantics
1062:Processor
838:195769468
641:2002–2004
623:SERENITY
312:Tolerance
251:Integrity
222:Integrity
2002:Security
1946:Category
1774:Graphics
1549:Security
1218:Compiler
1117:Networks
1014:Hardware
889:Archived
648:Archived
645:ANIKETOS
603:HIDENETS
595:ESFORS,
515:Journals
401:See also
168:security
143:and the
60:security
2012:Quality
1956:Outline
573:DESEREC
306:Removal
264:Threats
241:, i.e.
109:History
96:Threats
1992:Safety
836:
826:
633:, and
612:RESIST
552:
475:, 2002
464:Papers
253:, and
216:Safety
164:safety
139:, the
62:. In
56:safety
1359:Logic
1200:tools
834:S2CID
812:11615
674:IEC,
635:STILT
618:RODIN
587:NODES
539:Books
294:Means
102:Means
79:TC 56
1198:and
1071:Form
1067:Size
824:ISBN
550:ISBN
437:RAMS
166:and
73:The
58:and
816:doi
581:FP6
369:SOA
195:or
30:In
1983::
1069:/
946:.
922:.
854:.
832:.
822:.
806:.
760::
715:.
687:^
678:,
637:,
589:,
579:,
575:,
249:,
158:,
154:,
147:.
132:.
66:,
54:,
46:,
42:,
34:,
1007:.
987:e
980:t
973:v
956:.
932:.
864:.
840:.
818::
725:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.